Attacks/Breaches
10/11/2016
04:10 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

Symantec Warns Of Second Group Targeting SWIFT Network

Those behind the Odinaff Trojan are using tools and infrastructure associated with the infamous Carbanak cybercrime group, security vendor says

Cybersecurity firm Symantec Corp. this week identified a group of malicious hackers targeting the SWIFT payments network in the same manner that another group did earlier this year when looting tens of millions of dollars in brazen online bank heists.

Since January this year, the newly identified group has been using a sophisticated Trojan called Odinaff to try and break into the networks of multiple organizations, many of them in the financial services and banking sectors. Organizations providing support services to these companies have also been targeted.

Evidence gathered about the Odinaff group shows that it has mounted attacks on users of SWIFT, Symantec said.

The Odinaff attacks are similar to those carried out by a cybercriminal group that stole $81 million from the Bangladesh central bank earlier this year by exploiting weaknesses in the interface between the banks’ systems and the SWIFT network.

In the earlier attacks, the threat actors used tools, associated with a cybercrime group called Lazarus, to initiate fraudulent money transfer transactions from target banks and then later to conceal evidence of the illegal activity. The same attacks were played out across multiple banks, resulting in considerable millions of dollars in losses for the target banks.

Symantec said it has found evidence showing the Odinaff group targeting SWIFT users as well as using malware to conceal fraudulent transactions. “The tools used are designed to monitor customers’ local message logs for keywords relating to certain transactions,” it said. “They will then move these logs out of customers’ local SWIFT software environment,” to conceal evidence of illegal activity.

Despite the similarity in approach, there is nothing to suggest that the Odinaff group is linked to the group that carried out the earlier attacks on the Bangladesh bank and other financial institutions, Symantec said.

The security vendor described Odinaff as malware used in the initial phase of an attack to gain a foothold on a target system and to provide a persistent presence on it. The malware is being used to install other sophisticated tools on compromised systems.

At least some of the tools and the rogue infrastructure that the Odinaff group is using are similar to tools used by the infamous Carbanak group that has long targeted financial institutions. “This new wave of attacks has also used some infrastructure that has previously been used in Carbanak campaigns,” Symantec said in its alert.

The Odinaff attacks that Symantec investigated appeared to require a large degree of hands-on effort and the deployment of purpose-built back doors and tools to target computers of specific interest to the operators of the campaign. The attackers appear to have invested heavily in developing, deploying, and coordinating the use of multiple tools during targeted attacks, Symantec said.

Jon DiMaggio, senior threat intelligence analyst with Symantec Security Response, says there are multiple similarities between the Odinaff and Carbanak operations to suggest a link between the two.

Aside from similar targets, three command-and-control (C&C) IP addresses have been connected to previously reported Carbanak campaigns, he says. One of them was used in an intrusion at Oracle’s MICROS POS network earlier this year - an attack that was linked to Carbanak. Russian and Cyrillic text in certain strings of the malware also suggest the operators of the two groups have the same origins, DiMaggio says.

“The Odinaff attackers could be part of Carbanak, but it is also possible that the two groups are only loosely affiliated.”

Related stories:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.